Pass the Google Workspace Administrator Google-Workspace-Administrator Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Your compliance team has observed that employees at your organization are frequently resetting their passwords and is concerned about account hijacking. You need to create a solution to notify the compliance team whenever a user updates or resets their password. What should you do?

Options:

A.

Create and enforce a new password policy for all users in your organization.


B.

Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.


C.

Create an activity rule that is triggered by the User’s password changed event. Add compliance team members as email recipients.


D.

Create a new alert by using user log events. Check that the challenge type is “Password”, and add the compliance team as email recipients.


Questions # 22:

A user is experiencing intermittent issues accessing their Gmail inbox. Sometimes their Gmail loads slowly, and other times the user encounters error messages that haven’t been documented. You need to effectively troubleshoot this recurring problem. What should you do?

Options:

A.

Check the Google Workspace Status Dashboard for any reported service disruptions.


B.

Instruct the user to generate a HAR file the next time they experience slowness or an error.


C.

Instruct the user to try to access Gmail from another device or network to see if the issue persists.


D.

Instruct the user to clear their browser cache and cookies.


Questions # 23:

You are configuring data governance policies for your organization's Google Drive. You need to ensure that employees in the Research and Development department can share files with external users, while employees in the Finance department are blocked from sharing any files externally. What should you do?

Options:

A.

Create a Drive trust rule that allows external sharing for the Research and Development organizational unit (OU) and another rule that blocks external sharing for the Finance OU.


B.

Enable Vault for the Finance organizational unit (OU) to ensure that all files shared externally are retained and auditable.


C.

Apply an organization-wide data loss prevention (DLP) rule that scans for sensitive information and prevents external sharing of those files. Apply that rule to the Finance organizational unit (OU).


D.

Create a separate Google Workspace domain for the Finance organizational unit (OU) and disable external sharing for that domain.


Questions # 24:

Your organization has experienced a recent increase in unauthorized access attempts to your company’s Google Workspace instance. You need to enhance the security of user accounts while following Google-recommended practices. What should you do?

Options:

A.

Disable password recovery options to prevent unauthorized individuals from accessing user accounts.


B.

Implement a strong password policy and enable text messages as the 2-Step Verification (2SV) using text messages.


C.

Enforce the use of physical security keys as the 2-Step Verification (2SV) method for all users.


D.

Enforce a strong password policy that requires users to include special characters, numbers, and uppercase letters.


Questions # 25:

Your company wants to minimize distractions and inappropriate content in their Google Chat spaces. You need to give trusted employees the ability to remove messages and ban users from specific Chat spaces. What should you do?

Options:

A.

Assign the trusted employees as moderators for the relevant Chat spaces.


B.

Create a data loss prevention (DLP) rule that blocks inappropriate content from being shared


C.

Use the security investigation tool to audit and monitor Chat messages.


D.

Disable all Chat spaces except those specifically approved by management.


Questions # 26:

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

Options:

A.

Grant the super admin role to a delegate from the security team.


B.

Create a pre-built reporting role. Assign the role to the security team alias.


C.

Share the Drive audit log with the security team.


D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.


Questions # 27:

Your organization has enabled Google Groups for Business to let employees create and manage their own email distribution lists and web forums. You need to ensure that users cannot join external Google Groups with their Google Workspace accounts without interrupting internal group usage. What should you do?

Options:

A.

Set the setting for Google Groups for Business called Accessing groups from outside this organization to Private.


B.

In Additional Google Services, turn Google Groups OFF at the root organizational unit.


C.

Use the Directory API to change the settings of user-created groups to disable features that allow external users to access, view, or post on groups.


D.

Set the setting for Google Groups for Business called Default for permission to view conversations to All organization users.


Questions # 28:

Your company is transitioning to Google Workspace from legacy communication and collaboration applications. User accounts are managed in Active Directory and synced to Google Workspace by using Google Cloud Directory Sync (GCDS). Your company is implementing a new security policy for all accounts that requires complex passwords. Passwords must be at least 20 characters long, contain 3 symbols, 4 numbers, and 2 capital letters.

You need to enforce the new password policy in Google Workspace. What should you do?

Options:

A.

Share the instructions for changing a Google account password with your users. Monitor password strength in the Google Admin console as users change their passwords.


B.

Enable strong password enforcement and require a minimum length of 20 characters at the top-level organizational unit.


C.

Create a password policy in Active Directory. Install Password Sync on the global catalog servers for Active Directory and require a password change for your users.


D.

Create a password policy in Active Directory. Enable password synchronization in GCDS.


Questions # 29:

Your organization’s users are reporting that a large volume of legitimate emails are being misidentified as spam in Gmail. You want to troubleshoot this problem while following Google-recommended practices. What should you do?

Options:

A.

Adjust the organization’s mail content compliance settings in the Admin console.


B.

Advise users to individually allowlist senders.


C.

Disable spam filtering for all users.


D.

Contact Google Workspace support and report a suspected system-wide spam filter malfunction.


Questions # 30:

You notice an increase in support tickets related to Gmail. Multiple users are reporting that their emails are not loading, and they are receiving error messages. You need to troubleshoot the issue and identify potential causes. What should you do?

Options:

A.

Analyze the users' Gmail labels and filters to determine whether incoming emails are being inadvertently blocked.


B.

Collect the users' browser versions and extensions to identify potential compatibility issues.


C.

Review the users' email forwarding settings to ensure that emails are not being redirected to incorrect addresses.


D.

Gather HAR files from affected users to capture network traffic and analyze request/response details.


Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions